Research Data & Security Guidance Topics (A-Z)

Guidance topics related to research data and security are arranged alphabetically from A-Z and described below. Each topic is linked to its page location and may also include links to corresponding policies, guidance and/or templates.  If you are unable to find an answer to your question below, please contact Research Compliance Services.

Best Practices for Protecting Research Data
Cloud Storage
Cybersecurity Maturity Model Classification (CMMC)
Data Destruction

Data Security/Data Management Plans
Data Sharing
Data Use/Data Transfer Agreements & MTAs
Document Version Control
Encryption
Microsoft 365: OneDrive/Sharepoint/Teams
Mobile Apps/Software
Research Records Best Practices
Sensitive, Restricted, or Confidential Data & Issues to Consider
Tele/Video Conferencing (Zoom/Microsoft Teams)
Travel & Data Security
Additional Resources

Best Practices for Protecting Research Data

The following are general best practices research personnel should keep in mind and follow in order to appropriately safeguard research data:

All research personnel should review and utilize the following checklist in order to ensure data security practices are followed:

Cloud Storage

The use of cloud storage can be a very helpful and convenient way in which research teams access, generate or store research data. However, research personnel must be cognizant of what type of data they intend to place in a cloud environment and whether or not it is appropriate for the corresponding research data security level. One of the most important factors for researchers to remember, besides security of the data, is that, in most cases, the research data belongs to the University of Nebraska-Lincoln and not the researcher. It may be common practice to utilize cloud services for cost savings and ease of use; however special attention must be paid to potential security risks, confidentiality, export control restrictions, and data ownership issues.

Currently, the University’s sanctioned cloud-based storage is available via Microsoft One Drive and/or SharePoint/Restricted SharePoint. In general, Low or Medium Risk de-identified research data will usually not be problematic to store data in the cloud-based storage options, however, Medium and High Risk export controlled research data, may not be stored using these options. High Risk research data may not be stored in unrestricted OneDrive or SharePoint, unless the PI has received prior approval from NU ITS and the applicable research oversight body.

Due to data ownership and security oversight needs, research personnel are not allowed to store this information outside of UNL networks or systems, regardless of the data security level. However, if you are considering the storage of any data outside of UNL networks, research personnel must have approval to do so and the following questions, at minimum, will be required to be addressed by the University and applicable research oversight body:

Collecting or storing research data using the internet results in additional complexity as one must consider the jurisdictional authority: is it the jurisdiction of the researcher, the location of the study participants, or the location where the data is stored?  Data may be collected in one jurisdiction but then stored in another. Researchers need to be aware that there may be differing data security privacy policies.  It is important that researchers consider the laws, including international laws and export control regulations, and if needed, have agreements in place to ensure compliance.

Additional Resources:

Cybersecurity Maturity Model Classification (CMMC)

The CMMC is a program established by the United States Department of Defense (DoD) to standardize security practices and processes intended to protect Federal Contract Information (FCI), 48 CFR § 52.204-21 and/or Controlled Unclassified Information (CUI), Executive Order 13556, associated with DoD-funded research. While the CMMC was developed by, and primarily focuses on security for those working with the DoD, these cybersecurity practices will also eventually apply to other areas, and the campus as a whole, that research personnel may encounter at UNL.

The CMMC model framework organizes processes and cybersecurity best practices into a set of domains and 5 levels of maturity in practices and processes. CMMC involves an independent third-party assessment (from DoD approved assessors) of UNL’s compliance with a certain maturity level.

The DoD has already begun to incorporate requirements for CMMC into selected Requests for Proposals (RFPs), Requests for Information (RFIs), and research contracts. By 2025, all DoD contract awards will require CMMC certification to Level 1, at minimum. CMMC requirements will not be applied retroactively to existing contracts. The following Defense Federal Acquisition Regulations (DFARS) clauses may be what research personnel see in proposals/awards that require implementation of CMMC:

If research personnel plan to respond to a DoD RFP or RFI that includes the DFARS clauses above, please note the following:

Additional Resources:

Data Destruction

When a research project has ended or no longer has use for certain data, the PI may want to consider destroying the data.In general, the PI is responsible for the destruction of research data and the destruction must follow all applicable federal regulations, UNL policies on record retention and data disposal, sponsor requirements, research oversight body requirements, NU ITS requirements, and other applicable guidelines.

For research data destruction, secure disposal procedures should be utilized commensurate with the security level of that information and its related risk. (e.g., with increased risk associated with a data breach or loss of the data, the data media should be physically destroyed).  If the data classification or sensitivity is unknown, at a minimum, the PI should consider the data classification as High Risk.

Devices or media containing private-restricted or highly restricted information (i.e. Medium or High Risk) must be physically destroyed or the information must be destroyed, deleted or overwritten using tools or techniques to make the original information non-retrievable.  Overwriting should, at minimum, consist of a single pass with an industry standard and validated media sanitization tool supporting overwriting with all zeroes or all ones.

When destroying research data, the PI or research personnel should plan to retain documentation for audit purposes in order to record that the data was destroyed appropriately and in compliance with all regulations, agreements or policies. Destruction of research data documentation shall be retained by the unit.

For High Risk data that has been removed or destroyed, a sample form is available via the National Institutes of Standards and Technology.

For export controlled or controlled unclassified information or media, please contact the Export Control Office for assistance.

In addition, University of Nebraska Information Technology Services policies and information should also be referenced regarding the retention and destruction of data.

Data Security/Data Management Plans

Data security/data management plans (DMPs) are required as part of many research areas (IRB and Export Control being two areas frequently requiring these plans) and often times are required by specific federal sponsors. Typically, these plans are contained within their respective compliance applications and/or sponsor proposals/award. However, in many cases, additional oversight and separate security/management documents may be necessary in order to clearly detail how the data will be secured and managed throughout the life of the project.

DMPs must address not only how or where research data will be stored but also how it will be generated, accessed, transmitted, stored, and secured. When needed, and dependent on the security level of the data, NU ITS staff can assist you with research data security and storage, provide cost estimates when applicable, set up systems and more. Appropriate research data security and management can be costly, researchers must recognize the importance of planning for this process before a grant proposal or research protocol is submitted so any needed budget submissions can be included where possible.

The following are questions research personnel should think about when planning their research DMP needs:

Be sure and consult the Research Data and Security policy and guidance information regarding security level designations (Low, Medium, and High Risk). The appropriate level will need to be selected as part of many research oversight body processes.

Regardless of how much data your research will generate you should have a storage system in mind that will meet the needs of the project and the security levels. While USB drives, hard drives, and disks are cheap and easy solutions they do not provide great security and can be easily lost or destroyed.

The following provide additional resources for DMPs along with a couple of templates for use:

Data Sharing

The sharing of research data is a vital aspect of promoting transparency, public trust, and rigor within scientific fields. In some cases, a specific data sharing plan must be created in order to meet federal or other requirements. In other cases, data sharing may not be possible due to certain types of data having national security or military use concerns. The following are some areas research personnel must consider when planning their research projects:

Please Note: New data sharing policy and data sharing/management plan requirements for all NIH funded research studies is forthcoming and will be effective January 25, 2023. The NIH has created several new resources regarding these upcoming requirements. Visit the new NIH website on this topic here and watch NIH’s YouTube video about the new site here.

WHAT data will be shared?

WHO will have access to the data?

WHERE will the data to be shared and/or located?

WHEN will the data be shared?

HOW will researchers locate and access the data?

To share or not to share. The following table may help describe why data sharing is important or why data sharing may not always be feasible:

Reasons to Share DataReasons NOT to Share Data
Demonstrate appropriate stewardship of taxpayer fundsNational security concerns
Enable validation of research resultsPublication restrictions
Honor contributions of human subjects research participants, where available Informed consent did not adequately or appropriately notify human subjects research participants how data would be shared
Promote transparency, rigor, and reproducibilityProprietary/Intellectual property sponsor restrictions
Make high-value data sets availableRestricted data sets, or the combination of data sets that allows for re-identification

The following information, FAQs, and template are provided to further assist in addressing data sharing requirements:

Data Use/Data Transfer Agreements & MTAs

DUAs/DTUAs and MTAs are contractual documents for the use of a portion of data, transfer of a portion of data or a complete set of data where the data is nonpublic or is subject to some restrictions.  Universities must ensure that DUA/DTUA terms protect confidentiality, intellectual property, and security when necessary, but permit appropriate publication and sharing of research results in accordance with Federal, State and University regulations.

Research personnel are not authorized to complete these agreements. The Office of Sponsored Programs Awards Team is responsible for coordinating the transfer of data to or from another institution via a DUA, DTUA, or MTA. They will ask for information about the research, such as a project description, your funding, and compliance requirements (as applicable). They will consult with the IRB, NUtech, Export Control, IBC, and IACUC and any other applicable research oversight body, as needed for the agreement.

Agreements generally need to be in place for both incoming and outgoing data. The following are some points that you should ensure the OSP Awards Team is aware of when they are assisting you with requesting or receiving data:

Departments and research personnel should be particularly careful when an investigator is leaving UNL. In many cases, if the person that is departing does not have another institution/university that they plan on moving to, it may be difficult to share data and ensure appropriate stewardship. Discussion and consideration with the OSP Awards Team along with the applicable research oversight area should occur prior to any decisions being made regarding the transfer of data under these circumstances. This same process should also be followed if any data disputes or litigation arises regarding the transfer or ownership of the data.

Additional resources:

Document Version Control

Version control is a process used to keep track of and communicate, in a standardized manner, different drafts of a document. This process is important as it provides an audit trail for the revision and update of a finalized version. In particular, this process can be most readily utilized by researchers to track different versions of research documents, agreements, or consent forms that may be used in order to ensure the most current, and approved, document is being used.

Research personnel are encouraged to implement the use of version numbers to track the most up-to-date document. While there are many ways to approach version control of documents, this is the standard operating procedure used by Research Compliance Services. Please feel free to reference and use this SOP as needed.

UNL Guidance for Document Version Control:

Encryption

Encryption is the process of using algorithms or codes to transform electronic data to make it unreadable or inaccessible to unauthorized users.

Encryption should be implemented on storage devices (i.e. data “at rest”) and to network data (i.e. data “in motion”) in order to protect data when security requirements are necessary.

Encryption will not always be required when working with Low Risk research data. If you plan to store or work with Medium Risk research data, encryption may be needed; High Risk research data will always require encryption.  

Remember, the best way for ensuring sensitive or confidential data is managed appropriately is to avoid handling it. This type of data should only be stored or accessed when it is deemed necessary for your research.  

Examples REQUIRING encryption either at rest or in motion:

The process of transmitting and storing data is often overlooked as a risk.  Research personnel must plan prospectively regarding how to protect confidentiality and security. They should describe the methods to protect the data during collection and sharing both internally and externally to the University.  It is advisable to utilize a secure transmission process even if the data is anonymous, coded, or non-sensitive information.  If the research team develops a best practice on using a secure data transmission process, then it is less likely a data breach will occur.  Email notifications are generally not secure, except in very limited circumstances, and should not be used to share or transmit research data as a normal practice.  Text messages are stored by the telecommunications provider and therefore are not secure.  Data should be encrypted when “in-transit,” and the University provides extensive guidance, software, and resources to assist researchers in this.  Terms such as Secure Sockets Layer (SSL and HTTPS) or Secure File Transfer Protocol (SFTP) are indications that the data is being encrypted during transmission. 

To learn more about encryption, please visit the NU ITS Best Practices webpage.

Microsoft 365: OneDrive/Sharepoint/Teams

With the 2021 UNL transition from Box storage to equivalent Microsoft options, the following brief summaries may be useful to research personnel becoming familiar with and utilizing these storage options:

For further guidance, including FAQs, information on storage size limits, security, and privacy of these options, please reference the University of Nebraska ITS webpage. ITS also provides training information and guidance regarding One Drive and SharePoint here.

Mobile Apps/Software

Some researchers purchase mobile apps/software or build their own to interact with study participants or as a novel approach in research or intellectual property.  It is important for research personnel to seek expert IT review and, if commercially available, purchase the app through the UNL Procurement Office so a legal and data security review is performed.

Specific to human subjects research, if participants are asked to download a free app/software or provided monies for the download, the researcher is still responsible for disclosing potential risks.  It is possible that the app/software the participant downloaded will capture other data stored or linked to the phone/iPad etc on which it is installed (e.g., contact list, GPS information, access to other applications such as social media).  The researcher is responsible for understanding known or potential risks and conveying them to the study participant, whether the app/software is commercially produced or developed in house.

Commercially available apps/software publish “terms of service” that detail how app data will be used by the vendor and/or shared with third-parties.  It is the researcher’s responsibility to understand these terms, relay that information to participants or their applicable research oversight body (e.g. IRB/export control compliance program), and monitor said terms for updates. 

Research Records Best Practices

This guidance discusses the best practices for investigators to ensure quality research records and data integrity, in both paper and electronic formats.

UNL Guidance on research records best practices:

Sensitive, Restricted, or Confidential Data & Issues to Consider

Research data, or data that becomes part of the research record, can vary greatly depending on the research area and discipline involved. In general, the following are some different types of data that research personnel should be particularly cognizant of:

Tele/Video Conferencing (Zoom/Microsoft Teams)

Research personnel must be aware of security concerns or issues that can arise when utilizing tele/video conferencing technology. University licensed technology (Zoom/Teams) must be used when discussing research business, conducting interviews with participants, and/or other types of research related meetings. For security and confidentiality, the following are some precautions to consider:

Please be sure to review Zoom’s whitepaper (as well as their Encryption Whitepaper) describing certain features of the technology. 

Travel & Data Security

This guidance is intended to help inform travelers on University related research business, with university owned equipment regarding security responsibilities and best practices for protection of physical and electronic research data. Research personnel are required to fully understand the risks associated with working with University research data when off campus and should seek the assistance from Research Compliance Services and NUITS staff to help evaluate the appropriate level of security for their travel needs. The following are some best practices that should be followed when traveling.

Remember, the best way to protect research data is to not travel with it unless absolutely necessary. Do not travel with any devices or data you cannot replace, would not want to lose, or that could pose a breach of personal, identifiable, confidential, restricted, sensitive, or proprietary information.

While you are traveling:

Returning from traveling:

Additional Resources